Dummy Location Selection Scheme for K-anonymity in Location based Services

被引:13
|
作者
Wu, Di [1 ]
Zhang, Yu [1 ]
Liu, Yinlong [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
dummy location; k-anonymity; location based services; privacy; WIRELESS SENSOR; PRIVACY; GENERATION; NETWORKS;
D O I
10.1109/Trustcom/BigDataSE/ICESS.2017.269
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location-Based Service (LBS) becomes increasingly important for our daily life. However, the localization information in the air is vulnerable to various attacks, which result in serious privacy concerns. To overcome this problem, we formulate a multi-objective optimization problem with considering both the query probability and the practical dummy location region. A low complexity dummy location selection scheme is proposed. We first find several candidate dummy locations with similar query probabilities. Among these selected candidates, a cloaking area based algorithm is then offered to find K - 1 dummy locations to achieve K-anonymity. The intersected area between two dummy locations is also derived to assist to determine the total cloaking area. Security analysis verifies the effectiveness of our scheme against the passive and active adversaries. Compared with other methods, simulation results show that the proposed dummy location scheme can improve the privacy level and enlarge the cloaking area simultaneously.
引用
收藏
页码:441 / 448
页数:8
相关论文
共 50 条
  • [1] K-anonymity scheme for privacy preservation in location-based services on IoT environment
    Das, Ayan Kumar
    Tabassum, Ayesha
    Sadaf, Sayema
    Sinha, Ditipriya
    [J]. INTERNATIONAL JOURNAL OF AUTOMATION AND CONTROL, 2021, 15 (03) : 340 - 362
  • [2] A Clustering K-Anonymity Scheme for Location Privacy Preservation
    Yao, Lin
    Wu, Guowei
    Wang, Jia
    Xia, Feng
    Lin, Chi
    Wang, Guojun
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 134 - 142
  • [3] Distributed K-Anonymity Location Privacy Protection Scheme Based on Blockchain
    Liu, Hai
    Li, Xing-Hua
    Luo, Bin
    Wang, Yun-Wei
    Ren, Yan-Bing
    Ma, Jian-Feng
    Ding, Hong-Fa
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 942 - 960
  • [4] Privacy Protection Through k-anonymity in Location-based Services
    Zuberi, Rubina Shahin
    Lall, Brejesh
    Ahmad, Syed Naseem
    [J]. IETE TECHNICAL REVIEW, 2012, 29 (03) : 196 - 201
  • [5] k-anonymity based location privacy protection method for location-based services in Internet of Thing
    Wang, Bo
    Guo, Yina
    Li, Hongtao
    Li, Zhiying
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (20):
  • [6] Evaluation of an Entropy-based k-Anonymity Model for Location Based Services
    Sharma, Varun
    Shen, Chien-Chung
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2015, : 374 - 378
  • [7] A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services
    Zhang, Shaobo
    Li, Xiong
    Tan, Zhiyuan
    Peng, Tao
    Wang, Guojun
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 94 : 40 - 50
  • [8] Achieving Effective k-Anonymity for Query Privacy in Location-Based Services
    Wang, Jinbao
    Li, Yingshu
    Yang, Donghua
    Gao, Hong
    Luo, Guangchun
    Li, Jianzhong
    [J]. IEEE ACCESS, 2017, 5 : 24580 - 24592
  • [9] Location K-anonymity in indoor spaces
    Kim, Joon-Seok
    Li, Ki-Joune
    [J]. GEOINFORMATICA, 2016, 20 (03) : 415 - 451
  • [10] Achieving k-anonymity in Privacy-Aware Location-Based Services
    Niu, Ben
    Li, Qinghua
    Zhu, Xiaoyan
    Cao, Guohong
    Li, Hui
    [J]. 2014 PROCEEDINGS IEEE INFOCOM, 2014, : 754 - 762